[1] |
CHEN Jinfu, WANG Zhenxin, CAI Saihua, et al. Vulnerability Detection Method for Blockchain Smart Contracts Based on Metamorphic Testing[J]. Journal on Communications, 2023, 44(10): 164-176.
doi: 10.11959/j.issn.1000-436x.2023190
|
|
陈锦富, 王震鑫, 蔡赛华, 等. 基于蜕变测试的区块链智能合约漏洞检测方法[J]. 通信学报, 2023, 44(10): 164-176.
doi: 10.11959/j.issn.1000-436x.2023190
|
[2] |
QIAN Peng, LIU Zhenguang, HE Qinming, et al. Smart Contract Vulnerability Detection Technique: A Survey[J]. Journal of Software, 2022, 33(8): 3059-3085.
|
|
钱鹏, 刘振广, 何钦铭, 等. 智能合约安全漏洞检测技术研究综述[J]. 软件学报, 2022, 33(8): 3059-3085.
|
[3] |
HE Daojing, DENG Zhi, ZHANG Yuxing, et al. Smart Contract Vulnerability Analysis and Security Audit[J]. IEEE Network, 2020, 34(5): 276-282.
doi: 10.1109/MNET.001.1900656
|
[4] |
WANG Xinming, HE Jiahao, XIE Zhijian, et al. ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection[J]. IEEE Transactions on Services Computing, 2020, 13(2): 314-328.
|
[5] |
WANG Zexu, WEN Bin. Smart Contract Vulnerability Detection of Symbol Execution with Critical Path Pre-Searching[J]. Journal of Applied Sciences, 2024, 42(2): 364-374.
|
|
王泽旭, 文斌. 关键路径预搜索的符号执行智能合约漏洞检测[J]. 应用科学学报, 2024, 42(2): 364-374.
|
[6] |
PENG Kai, LI Meijun, HUANG Haojun, et al. Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey[J]. IEEE Internet of Things Journal, 2021, 8(15): 12004-12020.
|
[7] |
NGUYEN T D, PHAM L H, SUN Jun, et al. sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts[C]//ACM. Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. New York: ACM, 2020: 778-788.
|
[8] |
HU Teng, LIU Xiaolei, CHEN Ting, et al. Transaction-Based Classification and Detection Approach for Ethereum Smart Contract[EB/OL]. (2021-03-01)[2024-08-09]. https://doi.org/10.1016/j.ipm.2020.102462.
|
[9] |
ZHANG Xiaosong, NIU Weina, HUANG Shiping, et al. A Survey of Smart Contract Vulnerability Detection Methods Based on Deep Learning[J]. Journal of Sichuan University (Natural Science Edition), 2023, 60(2): 7-18.
|
|
张小松, 牛伟纳, 黄世平, 等. 基于深度学习的智能合约漏洞检测方法综述[J]. 四川大学学报(自然科学版), 2023, 60(2): 7-18.
|
[10] |
SONG Zitao, HU Yong. Research on Source Code Vulnerability Detection Method Based on Graph Neural Network[J]. Communication Technology, 2022, 55(5): 640-645.
|
|
宋子韬, 胡勇. 基于图神经网络的源码漏洞检测方法研究[J]. 通信技术, 2022, 55(5): 640-645.
|
[11] |
HUANG Jianjun, HAN Songming, YOU Wei, et al. Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2144-2156.
|
[12] |
ZHUANG Yuan, LIU Zhenguang, QIAN Peng, et al. Smart Contract Vulnerability Detection Using Graph Neural Network[C]//ACM. Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. New York: ACM, 2021: 3283-3290.
|
[13] |
ZHOU Yaqin, LIU Shangqing, SIOW J, et al. Devign: Effective Vulnerability Identifcation by Learning Comprehensive Program Semantics via Graph Neural Networks[EB/OL]. (2019-09-18)[2024-08-09]. https://doi.org/10.48550/arXiv.1909.03496.
|
[14] |
LIU Zhenguang, QIAN Peng, WANG Xiaoyang, et al. Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection[J]. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(2): 1296-1310.
|
[15] |
CHEN Qiaosong, HE Xiaoyang, XU Wenjie, et al. Reentry Vulnerability Detection Based on Pre-Training Technology and Expert Knowledge[J]. Computer Science, 2022, 49(S2): 713-720.
|
|
陈乔松, 何小阳, 许文杰, 等. 基于预训练技术和专家知识的重入漏洞检测[J]. 计算机科学, 2022, 49(S2): 713-720.
|
[16] |
WEN Min, WANG Rongcun, JIANG Shujuan. Source Code Vulnerability Detection Based on Relational Graph Convolution Network[J]. Journal of Computer Applications, 2022, 42(6): 1814-1821.
doi: 10.11772/j.issn.1001-9081.2021091691
|
|
文敏, 王荣存, 姜淑娟. 基于关系图卷积网络的源代码漏洞检测[J]. 计算机应用, 2022, 42(6): 1814-1821.
doi: 10.11772/j.issn.1001-9081.2021091691
|
[17] |
LIU Zhenguang, QIAN Peng, WANG Xiang, et al. Smart Contract Vulnerability Detection: from Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion[EB/OL]. (2021-06-17)[2024-08-09]. https://arxiv.org/abs/2106.09282v1.
|
[18] |
PARIZI R M, DEHGHANTANHA A, CHOO K K R, et al. Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains[EB/OL]. (2018-09-07)[2024-08-09]. https://arxiv.org/abs/1809.02702v1.
|
[19] |
QIAN Peng, LIU Zhenguang, HE Qinming, et al. Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models[J]. IEEE Access, 2020, 8: 19685-19695.
|